A+ CORE 2 220-1102 A+ CORE 2 220-1102 20 EXAM QUESTIONS FREE CLICK HERE TO BUY 250 EXAM QUESTIONS FOR 220-1102 1. A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively? SFTP SSH VNC MSRA None 2. A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method? Reinstalling Windows Performing a quick format Using disk-wiping software Deleting all files from command-line interface None 3. A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue? Reset the phone to factory settings. Uninstall the fraudulent application. Increase the data plan limits. Disable the mobile hotspot. None 4. A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process? End user acceptance Perform risk analysis Communicate to stakeholders Sandbox testing None 5. A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST? Scan and remove the malware. Schedule automated malware scans. Quarantine the system. Disable System Restore. None 6. A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution? Anti-malware Remote wipe Locator applications Screen lock None 7. A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement? Disable the browser from sending notifications to the Action Center. Run a full antivirus scan on the computer. Disable all Action Center notifications. Move specific site notifications from Allowed to Block. None 8. A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat? Run a startup script that removes files by name. Provide a sample to the antivirus vendor. Manually check each machine. Monitor outbound network traffic. None 9. A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor? Keyboard Touch pad Ease of Access Center Display settings None 10. A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted? Enable multifactor authentication. Increase the failed log-in threshold. Remove complex password requirements. Implement a single sign-on with biometrics. None 11. A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue? Application updates Anti-malware software OS reinstallation File restore None 12. A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure? WPA2 with TKIP WPA2 with AES WPA3 with AES-256 WPA3 with AES-128 None 13. A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading? Right-click the Windows button, then select Run... entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup None 14. A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do? Have the user consider using an iPad if the user is unable to complete updates. Have the user text the user's password to the technician. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key. Advise the user to wait for an upcoming, automatic patch. None 15. When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? Have the user provide a callback phone number to be added to the ticket. Assign the ticket to the department's power user. Register the ticket with a unique user identifier. Provide the user with a unique ticket number that can be referenced on subsequent calls. None 16. Which of the following is the MOST important environmental concern inside a data center? Battery disposal Electrostatic discharge mats Toner disposal Humidity levels None 17. A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the log-in issue? Expired certificate OS update failure Service not started Application crash Profile rebuild needed None 18. A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use? FAT32 ext4 NTFS exFAT None 19. Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader? Network and Sharing Center Programs and Features Default Apps Add or Remove Programs None 20. A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used? Privacy Indexing Options System Device Manager None 1 out of 4 Time's up 195
Masixole Mondi 8 November 2023 at 14:53 Thanks for these! Been using these for my upcoming A+ and N+ ….2023!!! Reply
Thanks for these! Been using these for my upcoming A+ and N+ ….2023!!!